ASA Version 7.0(6)
!
hostname ciscoasa
domain-name ciscoasa.com
enable password 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!
interface Ethernet0/0
nameif outside
security-level 0
ip address 111.111.107.201 255.255.255.192
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.11.251 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
management-only
!
passwd tsjKg7JHkl3qMaXK encrypted
ftp mode passive
access-list 101 extended permit icmp any any
access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list vpnsplit standard permit 192.168.11.0 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip local pool vpn-pool 192.168.30.1-192.168.30.100 mask 255.255.255.0
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list no-nat
nat (inside) 1 0.0.0.0 0.0.0.0
access-group 101 in interface outside
route outside 0.0.0.0 0.0.0.0 219.235.107.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
group-policy wlgs internal
group-policy wlgs attributes
vpn-idle-timeout 1800
split-tunnel-policy tunnelspecified
split-tunnel-network-list value vpnsplit
webvpn
username test password P4ttSyrm33SV8TYp encrypted
username datapart password cmuSZjj2pzwasn8i encrypted
username sunruichao password oqiShihZQ55e1wHo encrypted
aaa authentication ssh console LOCAL
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set vpnset esp-des esp-md5-hmac
crypto dynamic-map dymap 10 set transform-set vpnset
crypto dynamic-map dymap 10 set reverse-route
crypto map vpnmap 10 ipsec-isakmp dynamic dymap
crypto map vpnmap interface outside
isakmp identity address
isakmp enable outside
isakmp enable inside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
isakmp nat-traversal 20
tunnel-group wlgs type ipsec-ra
tunnel-group wlgs general-attributes
address-pool vpn-pool
authentication-server-group (outside) LOCAL
default-group-policy wlgs
tunnel-group wlgs ipsec-attributes
pre-shared-key *
isakmp keepalive threshold 20
telnet timeout 5
ssh 219.235.107.0 255.255.255.0 outside
ssh 0.0.0.0 0.0.0.0 outside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 60
console timeout 0
management-access inside
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
Cryptochecksum:3016601c943eb848602796f63ed0ae41
: end
NMX防火墙ASA5510配置
原创
©著作权归作者所有:来自51CTO博客作者sunrc的原创作品,请联系作者获取转载授权,否则将追究法律责任
上一篇:办公网PIX防火墙配置
下一篇:CA防火墙ASA配置
提问和评论都可以,用心的回复会被更多人看到
评论
发布评论
相关文章
-
Linux防火墙
Linux防火墙
Linux运维 iptables firewall firewalld -
思科ASA防火墙配置手册
思科ASA防火墙配置手册
cisco 职场 ACL 休闲 ASA -
1-思科防火墙:搭建防火墙环境
搭建防火墙环境
搭建防火墙环境 -
思科PIX防火墙×××的配置实例
思科PIX防火墙VPN的配置实例连接方式:
职场 VPN 休闲